====== Ubuntu - nmap - Aggressive nmap scanning ======
sudo nmap -sS -p- -PS80,22 -n -T4 -vvv –reason 192.168.1.69
result:
Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-08 01:38 BST
Failed to resolve "–reason".
Initiating SYN Stealth Scan at 01:38
Scanning 192.168.1.69 [65535 ports]
Discovered open port 139/tcp on 192.168.1.69
Discovered open port 445/tcp on 192.168.1.69
Discovered open port 80/tcp on 192.168.1.69
Discovered open port 17500/tcp on 192.168.1.69
Completed SYN Stealth Scan at 01:38, 6.53s elapsed (65535 total ports)
Nmap scan report for 192.168.1.69
Host is up (0.000019s latency).
Scanned at 2016-07-08 01:38:40 BST for 7s
Not shown: 65531 closed ports
PORT STATE SERVICE
80/tcp open http
139/tcp open netbios-ssn
445/tcp open microsoft-ds
17500/tcp open db-lsp
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 6.62 seconds
Raw packets sent: 65553 (2.884MB) | Rcvd: 131110 (5.507MB)